National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report WebSphere FS v9.1 and Fix Pack 1 Report Number: CCEVS-VR-07-0034 Dated: May 25, 2007 Version: 1.0 National Institute of Standards and Technology National Security Agency Information Technology Laboratory Information Assurance Directorate 100 Bureau Drive 9800 Savage Road STE 6740 Gaithersburg, MD 20899 Fort George G. Meade, MD 20755-6740 IBM Corporation WebSphere FS Validation Report ACKNOWLEDGEMENTS Validation Team Stephen Butterfield (Lead Validator) Noblis Jandria Alexander (Senior Validator) Aerospace Corporation Columbia, Maryland Common Criteria Testing Laboratory SAIC - 2 - IBM Corporation WebSphere FS Validation Report Table of Contents 1 EXECUTIVE SUMMARY............................................................................3 2 IDENTIFICATION........................................................................................3 3 SECURITY POLICY.....................................................................................5 3.1 IDENTIFICATION AND AUTHENTICATION...................................5 3.2 USER DATA PROTECTION.................................................................5 3.3 AUDIT.....................................................................................................5 3.4 TSF PROTECTION.................................................................................5 3.5 SECURITY MANAGEMENT................................................................5 4 ASSUMPTIONS & CLARIFICATION OF SCOPE....................................6 4.1 USAGE ASSUMPTIONS.....................................................................6 4.2 CLARIFICATION OF SCOPE.............................................................8 5 ARCHITECTURAL INFORMATION.........................................................8 6 DOCUMENTATION...................................................................................11 7 IT PRODUCT TESTING.............................................................................11 7.1 VENDOR TESTING.............................................................................11 7.2 EVALUATOR TESTING.....................................................................12 8 EVALUATED CONFIGURATION............................................................13 9 RESULTS OF THE EVALUATION...........................................................13 10 VALIDATOR COMMENTS AND RECOMMENDATIONS...................16 11 SECURITY TARGET..................................................................................16 12 GLOSSARY.................................................................................................17 13 BIBLIOGRAPHY........................................................................................18 - 3 - IBM Corporation WebSphere FS Validation Report 1 EXECUTIVE SUMMARY This report documents the NIAP validator’s assessment of the CCEVS evaluation of the IBM Corporation WebSphere Federation Server (FS). The evaluation was performed by the Science Applications International Corporation (SAIC) Common Criteria Testing Laboratory and was completed during May 2007. The information in this report is largely derived from the Evaluation Technical Report (ETR) written by SAIC and submitted to the validator. The evaluation determined that the product conforms to the Common Criteria Version 2.3, Part 2 extended and Part 3 and meets the requirements of EAL 4 augmented with ALC_FLR.1 (Basic Flaw Remediation). WebSphere FS is middleware product provided by IBM. As middleware (with an embedded RDBMS), WebSphere FS supports the Structured Query Language (SQL) interface from a client that is connected to the server. From the client, commands can be entered interactively or through an executing program to the server to create databases, database tables, and to store and retrieve information from tables either in the embedded DB2 instance or in other associated data sources. WebSphere FS can be installed on a number of possible operating environments. The TOE operates as a set of software applications in an IT environment consisting of the hosting operating system and platform (not included in the evaluation). The security services of the IT environment required by the WebSphere FS TOE have not been evaluated and therefore, need to be determined and assessed separately. These IT security services provided by the environment include protection of the TOE security Functions (TSF) domain separation (preventing bypass of the security functions), reliable time-stamps (used in time-stamping audit records), audit generation, security management and user identification and authentication. The WebSphere FS TOE provides functionality to meet security requirements in the areas of: security audit (generation, association of users in events, and audit review), user data protection, (implementation of a discretionary access control policy (DAC) and a label based access control (LBAC) policy for its objects), identification and authentication, security management and protection of the TSF (enforcement of the security policy). The TOE environment and the TOE security requirements are stated in the IBM Corporation WebSphere Federation Server v9.1 Security Target, Version 1.0, July 2007. The validator observed the activities of the evaluation team and provided guidance on technical issues and evaluation processes, reviewed successive versions of the Security Target, reviewed selected evaluation evidence, reviewed test plans, reviewed intermediate evaluation results (i.e., the CEM work units), and reviewed successive versions of the ETR and test report. The validator’s observations support the conclusion that the product satisfies the functional requirements and assurance requirements defined in the Security Target (ST). Therefore, the validator concludes that the findings of the evaluation team are accurate, and the conclusions justified. 2 IDENTIFICATION The CCEVS is a joint National Security Agency (NSA) and National Institute of Standards and Technology (NIST) effort to establish commercial facilities to perform trusted product evaluations. Under this program, security evaluations are conducted by commercial testing laboratories called - 4 - IBM Corporation WebSphere FS Validation Report Common Criteria Testing Laboratories (CCTLs) using the Common Evaluation Methodology (CEM) for Evaluation Assurance Level (EAL) 1 through EAL 4 in accordance with National Voluntary Laboratory Assessment Program (NVLAP) accreditation. The NIAP Validation Body assigns Validators to monitor the CCTLs to ensure quality and consistency across evaluations. Developers of information technology products desiring a security evaluation contract with a CCTL and pay a fee for their product’s evaluation. Upon successful completion of the evaluation, the product is added to NIAP’s Validated Products List. Table 1 provides information needed to completely identify the product, including: • The Target of Evaluation (TOE): the fully qualified identifier of the product as evaluated; • The Security Target (ST), describing the security features, claims, and assurances of the product; • The conformance result of the evaluation; • The Protection Profile to which the product is conformant (if applicable); • The organizations and individuals participating in the evaluation. Table 1: Evaluation Identifiers Item Identifier Evaluation Scheme United States NIAP Common Criteria Evaluation and Validation Scheme Target of Evaluation IBM DB2 Enterprise Server 9.1.1 with IBM WebSphere Federation Server, v9.1 and Fix Pack 1C Protection Profile None Security Target IBM Corporation WebSphere Federation Server v9.1 Security Target, Version 1.0, 7/15/07 Evaluation Technical Report Final Evaluation Technical Report For IBM WebSphere Federation Server, Version 0.2. CC Version Common Criteria for Information Technology Security Evaluation, Version 2.3, August 2005. Part 2: Security functional requirements, Version 2.3, August 2005 Part 3: Security assurance requirements, Version 2.3, August 2005. Conformance Result Part 2 extended, Part 3 conformant, EAL4 augmented Sponsor IBM Silicon Valley Lab Developer IBM Silicon Valley Lab Evaluators SAIC, Columbia, MD Validators Stephen Butterfield, Noblis Jandria Alexander, Aerospace Corporation - 5 - IBM Corporation WebSphere FS Validation Report 3 SECURITY POLICY The TOE implements the following Security Policies. 3.1 Identification and Authentication The TOE implements an Identification and Authentication policy which is responsible for ensuring that no database operations can be performed until the WebSphere FS Instance can confirm (using support of the operating system in the IT environment) that the identified user is identified and authenticated and maintaining the association of user security attributes with subsequent operations once an authenticated connection is established. 3.2 User Data Protection The TOE implements a discretionary access control, residual information protection, and rollback policy. The TOE provides User Data Protection in the following ways: • Making and enforcing the access decisions for databases and their associated objects that are subject to the discretionary access control policy and the label based access control policy. • Ensuring that protected objects do not contain residual information when they are created, and, • Providing the ability to roll back operations on database objects and their content. WebSphere FS also includes the ability to control who can pass requests to other data sources and who can access credentials that might be associated with other data sources. 3.3 Audit The TOE enforces the generation of audit records according to how it is configured (e.g. based upon audit type), including the timestamp from the operating system in the audit records, and provides support for the review of the audit data. 3.4 TSF Protection The TOE provides support for the Protection of the TSF security function at its interfaces by allowing access only when its security mechanisms have been successfully invoked. Additionally, the TOE collects time information from the environment (i.e., the operating system) 3.5 Security Management The TOE provides security management functionality necessary to manage TOE data. The functionality includes support for the following: - 6 - IBM Corporation WebSphere FS Validation Report • Management of the audit function and review of audit data, allowing access to functions that manage user security attributes (granting and revoking), and; • Management of access control settings on databases content. The TOE supports the roles of authorized administrator and user. As part of the security management policy, the TOE also ensures that only authorized administrators can perform functions not allowed to normal users. 4 ASSUMPTIONS & CLARIFICATION OF SCOPE 4.1 Usage Assumptions The system is expected to be used in what has traditionally been known as a relatively benign, or non- hostile, environment. The Assumptions as presented in the ST are noted below. Personnel Assumptions • There will be one or more competent individuals assigned to manage the TOE and the security of the information it contains. • The system administrative personnel are not careless, willfully negligent, or hostile, and will follow and abide by the instructions provided by the administrator documentation. • Authorized users possess the necessary authorization to access at least some of the information managed by the TOE and are expected to act in a cooperating manner in a benign environment. • Procedures exist for granting users authorization for access to specific security levels. Physical Assumptions The TOE is intended for application in areas that have physical control and monitoring. It is assumed that the following physical conditions will exist: • The processing resources of the TOE will be located within controlled access facilities, which will prevent unauthorized physical access. • The hardware and software critical to security policy enforcement will be protected from unauthorized physical modification. Connectivity Assumptions - 7 - IBM Corporation WebSphere FS Validation Report • All connections to peripheral devices reside within the controlled access facilities. The TOE only addresses security concerns related to the manipulation of the TOE through its authorized access points. Internal communication paths to access points such as terminals are assumed to be adequately protected. • The IT Environment underlying the TOE is assumed to fulfill the requirements for the IT Environment described in this ST. It is also assumed that the IT Environment will provide a suitable operational environment for the TOE where the TOE will be able to properly execute and the dependencies that the TOE has upon the IT Environment are properly fulfilled. The ST identifies the following requirements for the IT Environment: Security Functional Class Security Functional Components FAU_GEN.1b Audit data generation Security Audit (FAU) FAU_STG.1: Guarantees of Audit Data Availability User Data Protection (FDP) FDP_RIP.2b Full residual information protection FIA_ATD.1b User attribute definition FIA_SOS.1 Verification of secrets FIA_UAU.2b User authentication before any action FIA_UAU.7 Protected authentication feedback Identification and authentication (FIA) FIA_UID.2b User identification before any action FMT_MTD.1c Management of TSF data FMT_MTD.1d Management of TSF data FMT_MTD.1e Management of TSF data FMT_REV.1b Revocation FMT_SMF.1b Specification of Management Functions Security management (FMT) FMT_SMR.1b Security Management Roles FPT_AMT.1 Abstract Machine Testing FPT_RVM.1b Reference Mediation FPT_SEP.1 Domain Separation Protection of the TSF (FPT) FPT_STM.1b Reliable Time Stamps - 8 - IBM Corporation WebSphere FS Validation Report 4.2 CLARIFICATION OF SCOPE The Security Target delineates the security requirements of the TOE, which determined the scope of the evaluation. The security requirements allocated to the IT environment have not been verified as part of the WebSphere FS TOE evaluation. The IT security services provided by the environment support the protection of the TOE security Functions (TSF) including domain separation, reference mediation (preventing bypass of the security functions), reliable time-stamps (used in time-stamping audit records), audit generation, security management and user identification and authentication. The FPT_SEP.1 requirement is allocated exclusively to the IT environment. Therefore, the scope of the evaluation does not include a determination of the ability of the TOE to protect itself from tampering or the ability to maintain a security domain that is protected from interference and tampering by untrusted subjects or to enforce separation between the security domains of subjects in the TOE Scope of control. Other SFRs allocated exclusively to the IT environment include FIA_SOS.1, FIA_UAU.7 and FPT_AMT.1. Therefore the IT environment is also exclusively responsible for meeting the strength metrics for authentication secrets, obscuring feedback during authentication, and providing abstract machine testing. 5 ARCHITECTURAL INFORMATION WebSphere FS is middleware product provided by IBM. As middleware (with an embedded RDBMS), WebSphere FS supports the Structured Query Language (SQL) interface from a client that is connected to the server. From the client, commands can be entered interactively or through an executing program to the server to create databases, database tables, and to store and retrieve information from tables either in the embedded DB2 instance or in other associated data sources. WebSphere FS can be installed on a number of possible operating environments. - 9 - IBM Corporation WebSphere FS Validation Report Figure 1 TOE Security Environment Host OS Shared Memory WebSphere FS Instance (TOE) DRDA Application Server SQL Processing • Compiler • Manager • Runtime Non-SQL Processing • Create Database • Utilities • Some APIs TCP/IP OS Utilities (User) • Bufferi ng OS Utilities (Kernel) • System info • User Wrappers Client Libraries Local Client Remote Client Othere Data Servers Othere Data Servers Other Data Servers The following figure provides an abstract view of how DB2 and WebSphere FS components are organized to offer a complete WebSphere FS product. The components identified in yellow are shipped with DB2. The components in green are shipped as part of WebSphere FS. The components in red are provided by the data source developers. - 10 - IBM Corporation WebSphere FS Validation Report DB2 only components Components shared between DB2 and WS-FS Query gateway component (shipped with DB2 but active only when a wrapper is used) Wrapper 1 Wrapper 2 Wrapper 3 Data source client 1 Data source client 2 Data source client 3 Database server 2 Database server 1 Database server 3 Figure 2 DB2 and WebSphere FS Components The TOE for the WebSphere FS configuration includes all components within the lightly shaded box of Figure 1 TOE Security Environment entitled “WebSphere FS Instance.” The TOE is at least one partition, but can be distributed across a number of logically (i.e., on the same underlying machine) or physically (i.e., on different underlying machines) separate partitions. This latter feature is known as Database Partitioning Feature (DPF). From the user perspective, there is effectively no difference, while the distributed partitions work in concert to answer user queries. In relation to the figure above, the ‘WebSphere FS Instance’ may actually be distributed across multiple WebSphere FS partitions acting together to form that logical view. Note that WebSphere FS is based primarily on DB2 v9.1. There are some internal modifications, but the most obvious differences are a series of wrappers that allow WebSphere FS to interact with other data - 11 - IBM Corporation WebSphere FS Validation Report sources (other database products as well as non-database data sources such as flat files) using corresponding client libraries. All other functions are allocated to the IT Environment, which in this case is the Host Operating System (OS), inside the darkly shaded box of Figure 1 TOE Security Environment. The WebSphere FS software is tightly linked to the OS and in some cases, security functions are allocated to the OS, as appropriate. For the purposes of this ST, the OS is AIX 5.3 and Linux RHEL 4. Note that while the product has been designed to operate on other OSs, such as other versions of Linux, Microsoft Windows Servers, and Sun Solaris, the evaluated configuration has been limited for practicality. 6 DOCUMENTATION The developer-issued guidance identified below is based on the documentation provided as evaluation evidence. All documentation provided for the TOE was evaluated. o Common Criteria Certification: Installing IBM DB2 Version 9.1 Enterprise Server Edition for Linux, Unix and Windows – Revision 00 o Common Criteria Certification: Installing and Administering IBM WebSphere Federation Server. 7 IT PRODUCT TESTING 7.1 Vendor Testing The description of the vendor suite is documented in the following evaluation evidence documents: IBM WebSphere Federation Server Version 9.1 For Linux, Unix, and Windows Test Plan, Version 0.3, 5/8/07 IBM WebSphere Federation Server Version 9.1 Test Coverage Analysis, Version 0.11, 5/8/2007 IBM WebSphere Federation Server Version 9.1 Test Suite Readme Document, Version 0.1, 3/1/07 Testing Approach: The developer testing approach is described in the Developer Test Plan. There are two test suites run on WS-FS. The DB2 test suite (the test suite run during the DB2 evaluation) is re-run on WS-FS The WS-FS specific test suite (focusing only on the WS-FS additional functionality) - 12 - IBM Corporation WebSphere FS Validation Report All of the WebSphere FS security functions is performed by a series of automated tests. These tests are mapped to the test cases outlined in the Functional Specification document. Together they demonstrate the security-relevant behavior of WebSphere FS at the interfaces defined in that document: the Command Line User Interface, SQL Interface, API Interface, and the DRDA Interface. The goal of the tests is to demonstrate that WebSphere FS meets the security functional requirements specified in the Security Target. The security functions to be tested are the same as those mentioned in the Security Target: Audit, User Data Protection, Identification & Authentication, Security Management, and Protection of the TSF. Test Descriptions The test procedure descriptions are provided in a collection .txt files that include several test cases. For each test case within the .txt file, a description of what is tested (equivalent to a test case in the Functional Specification document) and an overview of how it is tested is provided. A test package is provided for each platform included in the test configuration. The test package includes several directories. Each directory includes the following files, one for each of the .txt test description files: • .rrn files (test output) • .sqc (written in C) and .pl (written in perl) files (test source files) • .rxp files (expected test results files) • .rrn files (actual test results in the collection of the rrn files) Depth and Coverage: The amount of testing performed as it relates to the required functionality is described in the rationale for ATE_COV work units. The depth of testing performed as it relate to the High Level design is described in the rationale for the ATE_DPT work units. Test Results: The test suite is an automated test suite. For each test description file (e.g. CC042.txt), there is an .exp file (e.g. CC042.exp) that describes the expected results and a .rrn file (e.g. CC042.rrn) that provides the actual results of a test run. Additional files with the extension .err and .dfr – representing errors and differences, respectively – are also generated detailing any inconsistencies between the .rxp (expected results) file and the .rrn (actual results) file. If no errors are generated during testing, the file with extension .dfr is created with a size of zero (0) bytes and no error file (.err) file is generated. 7.2 Evaluator Testing The evaluation team performed the TOE installation, as specified in the Installation, Generation and Startup documentation and performed functional, independent and vulnerability testing. The test configuration consists of the TOE installed on two separate configurations: one running AIX and another running Linux The following product options was installed on the following platforms: - 13 - IBM Corporation WebSphere FS Validation Report AIX configuration: IBM DB2 Enterprise Server 9.1.1 with IBM WebSphere Federation Server, v9.1 and Fix Pack 1C installed on AIX 5.3 DPF configuration Linux configuration IBM DB2 Enterprise Server 9.1.1 with IBM WebSphere Federation Server, v9.1 and Fix Pack 1C installed on Red Hat Linux 4 Serial configuration The test tools used by the developer test suite are documented in the Developer Test Plan. The above test configurations were compared to the TOE identification included in the ST and found to be consistent. All platforms included in the ST are included in the vendor test configuration and sufficiently represented in the evaluator test configuration. The WebSphere FS security testing consisted of automated tests. The tests map to the test cases outlined in the Functional Specification document and demonstrate the security-relevant behavior of WebSphere FS at the interfaces defined in the functional specification. These interfaces consist of the Command Line User Interface, SQL Interface, API Interface, and the DRDA Interface. The goal of the tests is to demonstrate that WebSphere FS meets the security functional requirements specified in the Security Target. The security functions tested are those described in the Security Target: Audit, User Data Protection, Identification & Authentication, Security Management, and Protection of the TSF. Team tests for audit, access control, and Identification and Authentication were performed with passing results. A penetration test for privilege checking and non security relevant claims was performed with a passing result. 8 EVALUATED CONFIGURATION IBM DB2 Enterprise Server 9.1.1 with IBM WebSphere Federation Server, v9.1 and Fix Pack 1C (the TOE) is a middleware product developed by IBM Silicon Valley Lab, 555 Bailey Ave. San Jose, CA and sold by IBM Corporation. In the evaluation configuration, the TOE can be installed upon • AIX 5.3 • RedHat Linux (RHEL 4) - 14 - IBM Corporation WebSphere FS Validation Report 9 RESULTS OF THE EVALUATION The evaluation was conducted based upon CC version 2.3 and CEM version 2.3 The evaluation determined the IBM WebSphere FS TOE to be Part 2 conformant, and to meet the Part 3 Evaluation Assurance Level (EAL 4) requirements augmented with ALC_FLR.1 9.1 Evaluation of the IBM WebSphere FS Security Targets (ST) (ASE) The evaluation team applied each ASE CEM work unit. The ST evaluation ensured the ST contains description of the environment in terms of policies and assumptions, a statement of security requirements claimed to be met by the IBM WebSphere FS product that are consistent with the Common Criteria, and product security function descriptions that support the requirements. 9.2 Evaluation of the CM capabilities (ACM) The evaluation team applied each EAL 4 ACM CEM work unit. The ACM evaluation ensured the TOE is identified such that the consumer is able to identify the evaluated TOE. The evaluation team ensured the adequacy of the procedures used by the developer to accept, control and track changes made to the TOE implementation, design documentation, test documentation, user and administrator guidance, security flaws and the CM documentation. The evaluation team ensured the procedure included automated support to control and track changes to the implementation representation. The procedures reduce the risk that security flaws exist in the TOE implementation or TOE documentation. 9.3 Evaluation of the Delivery and Operation documents (ADO) The evaluation team applied each EAL 4 ADO CEM work unit. The ADO evaluation ensured the adequacy of the procedures to deliver, install, and configure the TOE securely. The evaluation team ensured the procedures addressed the detection of modification, the discrepancy between the developer master copy and the version received, and the detection of attempts to masquerade as the developer. 9.4 Evaluation of the Development (ADV) The evaluation team applied each EAL 4 ADV CEM work unit. The evaluation team assessed the design documentation and found it adequate to aid in understanding how the TSF provides the security functions. The design documentation consists of a functional specification, a high-level design document, a low-level design document, and a security policy model. The evaluation team also ensured that the correspondence analysis between the design abstractions correctly demonstrated that the lower abstraction was a correct and complete representation of the higher abstraction. Additionally, the evaluation team ensured that the security policy model document clearly describes the security policy rules that were found to be consistent with the design documentation. 9.5 Evaluation of the guidance documents (AGD) The evaluation team applied each EAL 4 AGD CEM work unit. The evaluation team ensured the adequacy of the user guidance in describing how to use the operational TOE. Additionally, the evaluation team ensured the adequacy of the administrator guidance in describing how to securely administer the TOE. - 15 - IBM Corporation WebSphere FS Validation Report 9.6 Evaluation of the Life Cycle Support Activities (ALC) The evaluation team applied each EAL 4 ALC CEM work unit. The evaluation team ensured the adequacy of the developer procedures to protect the TOE and the TOE documentation during TOE development and maintenance to reduce the risk of the introduction of TOE exploitable vulnerabilities during TOE development and maintenance. The evaluation team ensured the procedures described the life-cycle model and tools used to develop and maintain the TOE. The evaluation team also applied the ALC_FLR.1 related work units from the Flaw Remediation CEM Supplement (Evaluation Methodology, Supplement: ALC_FLR - Flaw Remediation, Version 1.1, February 2002, CEM-2001/0015R). The evaluation team ensured the developer has a process to track flaws, document flaws, address flaws, and provide flaw information to TOE users. 9.7 Evaluation of the Test Documentation and the Test Activity (ATE) The evaluation team applied each EAL 4 ATE CEM work unit. The evaluation team ensured that the TOE performed as described in the design documentation and demonstrated that the TOE security functional requirements are enforced by the TOE. Specifically, the evaluation team ensured that the vendor test documentation sufficiently addresses the security functions as described in the functional specification and high level design specification. The evaluation team performed a sample of the vendor test suite, and devised an independent set of team test and penetration tests. The vendor tests, team tests, and penetration tests substantiated the security functional requirements in the ST. 9.8 Vulnerability Assessment Activity (AVA) The evaluation team applied each EAL 4 AVA CEM work unit. The evaluation team ensured that the TOE does not contain exploitable flaws or weaknesses in the TOE based upon the developer strength of function analysis, the developer vulnerability analysis, the developer misuse analysis, and the evaluation team’s misuse analysis and vulnerability analysis, and the evaluation team’s performance of penetration tests. 9.9 Summary of Evaluation Results The evaluation team’s assessment of the evaluation evidence demonstrates that the claims in the ST are met. Additionally, the evaluation team’s performance of a subset of the vendor tests suite, the independent tests, and the penetration test also demonstrated the accuracy of the claims in the ST. 9.10 Assurance Requirement Results The assurance requirements for the TOE evaluation are those required by EAL4. 9.10.1 Common Criteria Assurance Components The CEM work units associated with EAL4 are distributed amongst the ETR sections in chapter 15 of the ETR. Collectively, the ETR sections in chapter 15 encompass all CEM work units for EAL4. Each ETR section includes the CEM work units associated with that ETR section title (e.g. ACM). Within each ETR section, for each CEM work unit the following is provided: • Verdict • Verdict Rationale The rationale justifies the verdict using the CC, the CEM, and any interpretations and the evaluation evidence examined. The rationale demonstrates how the evaluation evidence meets each aspect of the criteria. - 16 - IBM Corporation WebSphere FS Validation Report The work performed contains a description of the action performed or the method used to apply the work unit. 9.10.1.1 Testing and Vulnerability Assessment In addition to ETR sections the evaluator developed a Test Plan/Report Part to capture the detail beyond the CEM work unit information. This detail is described within the CEM guidance for the testing and vulnerability assessment work units. Primarily, the additional detail is focused on team test procedures, penetration test procedures, results from running the vendor’s test suite. The evaluation team prepared a Draft of the Test Plan/Report prior to testing that addressed the selection of vendor tests to run, the team test procedures, and the penetration test procedures. After performing the test, the Test Report Part was updated to include the actual results from the vendor sample run and the team test. The Test Report Part is included in chapter 15 of the ETR. 9.11 Conclusions The conclusions for the ST evaluations and the TOE evaluations are addressed below. ST Evaluation Each verdict for each CEM work unit in the ASE ETR is a “PASS”. Therefore, the IBM Corporation WebSphere Federation Server v9.1 Security Target is a CC compliant ST. TOE Evaluation The verdicts for each CEM work unit in the ETR sections included in chapter 15 are each “PASS”. Therefore, the IBM WebSphere FS TOE (see below product identification) satisfies the IBM Corporation WebSphere Federation Server v9.1 Security Target, when configured according to the following guidance documentation: Common Criteria Certification: Installing and Administering IBM WebSphere Federation Server. 9.12 Summary of Evaluation Results The evaluation team’s assessment of the evaluation evidence demonstrates that the claims in the ST are met. Additionally, the evaluation team’s performance of a subset of the vendor test suite, the independent tests, and the penetration test further demonstrated the claims in the ST. 10 VALIDATOR COMMENTS AND RECOMMENDATIONS The team testing activity included a review of the vendor’s internal database of reported problems and flaws and enhanced the vendor’s process in tracking these reported problems to resolution. - 17 - IBM Corporation WebSphere FS Validation Report 11 SECURITY TARGET The IBM Corporation WebSphere Federation Server v9.1 Security Target, Version 1.0, 7/15/07 is included here by reference. - 18 - IBM Corporation WebSphere FS Validation Report 12 GLOSSARY CC Common Criteria CCEVS Common Criteria Evaluation and Validation Scheme CCTL Common Evaluation Testing Laboratory CEM Common Evaluation Methodology CM Configuration Management DAC Discretionary Access Control DDL Data Definition Language DML Data Manipulation Language DRDA Distributed Relational Database Architecture EAL Evaluation Assurance Level ETR Evaluation Technical Report LBAC Label Based Access Control NIAP National Information Assurance Partnership NIST National Institute of Standards & Technology NSA National Security Agency NVLAP National Voluntary Laboratory Assessment Program OS Operating System PP Protection Profile RDBMS Relational Database Management System SFR Security Functional Requirement SQL Structured Query Language ST Security Target TCSEC Trusted Computer System Evaluation Criteria TOE Target of Evaluation TSF TOE Security Function TSFI TOE Security Function Interface - 19 - IBM Corporation WebSphere FS Validation Report 13 BIBLIOGRAPHY [1] Common Criteria for Information Technology Security Evaluation – Part 1: Introduction and general model, dated August 2005, Version 2.3. [2] Common Criteria for Information Technology Security Evaluation – Part 2: Security functional requirements, dated August 2005, Version 2.3.. [3] Common Criteria for Information Technology Security Evaluation – Part 2: Annexes, dated August 1999, Version 2.1. [4] Common Criteria for Information Technology Security Evaluation – Part 3: Security assurance requirements, dated August 2005, Version 2.3. [5] Common Evaluation Methodology for Information Technology Security – Part 1: Introduction and general model, dated August 2005, Version 2.3.. [6] Common Evaluation Methodology for Information Technology Security – Part 2: Evaluation Methodology, dated August 1999, version 1.0. [7] Part 2: Evaluation Methodology, Supplement: ALC_FLR - Flaw Remediation, Version 1.1, February 2002, CEM-2001/0015R [8] Evaluation Technical Report for IBM WebSphere FS Part 2 (Proprietary), Revision 0.1 [9] IBM Corporation WebSphere Federation Server 9.1 Security Target, Version 1.0, 15 July 2007. [10] NIAP Common Criteria Evaluation and Validation Scheme for IT Security, Guidance to Common Criteria Testing Laboratories, Version 1.0, March 20, 2001 - 20 -